4.3 Article

Mitigating Stealthy Jamming Attacks in Low-power and Lossy Wireless Networks

期刊

JOURNAL OF COMMUNICATIONS AND NETWORKS
卷 20, 期 2, 页码 219-230

出版社

KOREAN INST COMMUNICATIONS SCIENCES (K I C S)
DOI: 10.1109/JCN.2018.000028

关键词

Jamming; low-power and lossy network (LLN); IEEE 802.15.4; security; wireless sensor network

资金

  1. National Research Foundation of Korea (NRF) - Ministry of Education [NRF-2017R1D1A1B03031348]
  2. NRF - Korea government (MSIP) [2015R1A2A2A01008240]
  3. NRF - Ministry of Science, ICT and Future Planning [2017R1E1A1A01074358]

向作者/读者索取更多资源

Jamming in wireless networks has advanced to be more stealthy and long-lasting with limited energy. Stealthy attackers transmit short jamming signals to become less detectable with less energy, and yet powerful enough to ruin entire packet transmission procedures. In this article, we deal with three types of stealthy attacks: 'Reactive jamming', 'Jamming ACK', and 'Fake ACK' attacks. These attacks are fatal to low-power and lossy wireless network (LLN) applications because they not only interfere with communication, but also cause LLN devices to quickly drain their batteries. To counter these attacks, we present Dodge-Jam, a lightweight anti-jamming technique suitable for LLN environments to address the stealthy jamming attacks. It protects ACK packet by switching the ACK exchange channel to a channel calculated based on the content of a data packet. Moreover, by partitioning a packet into multiple blocks and performing logical shifts of the blocks when retransmitting the packet, it helps the receiver recover the original packet from received multiple erroneous packets. We implement Dodge-Jam on practical embedded devices, and evaluate its performance through mathematical analysis and experiments on a multi-hop LLN testbed. Our results show that Dodge-Jam successfully avoids many stealthy jamming attacks, recovers jammed packets, and significantly improves packet delivery performance of single-hop and multi-hop networks with small overhead. (1)

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.3
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据